StudyKraken Law
Print Сite this

Critical Infrastructure Vulnerability Assessments

Risk assessment tools continue to evolve alongside the newly discovered or manufactured threats to infrastructure security. I chose to write about the protection plan for the communications sector. Communication companies are operating on a global scale, making them more vulnerable to manmade threats and cyberattacks (Homeland Security, 2015). Disruption of these services can lead to significant instabilities for other infrastructures (“Critical infrastructure vulnerability assessments,” n.d.). Therefore, I assume that the communication sector is one of the most protected and implements the most in-depth vulnerability assessment tools.

I believe that the accumulation of data is essential for reducing the potential loopholes for all types of threats. The value of data gathering can not be underestimated during a risk assessment, as it will be used to improve mitigation strategies further, and communications companies deal with an astounding amount of it (Radvanovsky & McDougall, 2013). A significant portion of the infrastructure is operated by the private sector, making its capacity to withstand threats a vital part of the overall security of a framework (Radvanovsky & McDougall, 2019). Therefore, it might be even more beneficial to make participation mandatory, but even voluntary data provision is helpful.

If I were to advise on security for infrastructure during a present threat, I would use the assessment tools to determine the course of action. Most of the reviewed factors suffice the needs of a company in the determination of a further plan of action. Assuming that threat occurrence was done correctly, a company is supposed to possess sufficient resources to neutralize it. However, if I were to improve any steps in the process, I would propose to focus more on the continuation of service, as interconnectedness implies that the damage can be extended if the attack succeeds (Giannopoulos et al., 2012). Otherwise, vulnerability assessment should be sufficient if it was correctly executed.

References

Critical infrastructure vulnerability assessments. (n.d.). Cybersecurity & Infrastructure Security Agency.

Giannopoulos, G., Filippini, R., Schimmer, M., & European Commission. Joint Research Centre. Institute for the Protection and the Security of the Citizen. (2012). Risk assessment methodologies for critical infrastructure protection: A state of the art (EUR 25286 EN – 2012). European Commission. Web.

Homeland Security. (2015). Communications sector-specific plan: An annex to the NIPP 2013. Cybersecurity & Infrastructure Security Agency.

Radvanovsky, R. S., & McDougall, A. (2013). Critical infrastructure: Homeland Security and emergency preparedness (3rd ed.). CRC Press.

Radvanovsky, R. S., & McDougall, A. (2019). Critical infrastructure: Homeland Security and emergency preparedness (4th ed.). CRC Press.

Cite this paper

Select style

Reference

StudyKraken. (2022, August 24). Critical Infrastructure Vulnerability Assessments. Retrieved from https://studykraken.com/critical-infrastructure-vulnerability-assessments/

Reference

StudyKraken. (2022, August 24). Critical Infrastructure Vulnerability Assessments. https://studykraken.com/critical-infrastructure-vulnerability-assessments/

Work Cited

"Critical Infrastructure Vulnerability Assessments." StudyKraken, 24 Aug. 2022, studykraken.com/critical-infrastructure-vulnerability-assessments/.

1. StudyKraken. "Critical Infrastructure Vulnerability Assessments." August 24, 2022. https://studykraken.com/critical-infrastructure-vulnerability-assessments/.


Bibliography


StudyKraken. "Critical Infrastructure Vulnerability Assessments." August 24, 2022. https://studykraken.com/critical-infrastructure-vulnerability-assessments/.

References

StudyKraken. 2022. "Critical Infrastructure Vulnerability Assessments." August 24, 2022. https://studykraken.com/critical-infrastructure-vulnerability-assessments/.

References

StudyKraken. (2022) 'Critical Infrastructure Vulnerability Assessments'. 24 August.

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyKraken, request the removal.